Need-to-Know GDPR Terminology for Compliance Success- Part 4

GDPR Terminology

GDPR from A-Z

This is the last of our GDPR terminology series and the General Data Protection Regulation (GDPR) is just around the corner. We hope this series and the rest of our blogs have provided you with resources for successful GDPR compliance. We’ll continue to provide educational resources and excellent training for ongoing GDPR compliance after the regulation’s enactment on May 25th. This cheat sheet of GDPR terminology, from Ri to Z, can help you better understand the legislation and resources associated with it, or help you evangelize awareness to the rest of your organization.

GDPR Terminology

Did you miss GDPR Terminology P-Re? Click here for more terms. 



Here’s your GDPR Terminology Cheat-Sheet from Ri-Z:

We’ve included an index of each term, of which chapters, articles and recitals they appear in. Use this nifty resource to follow along in the regulation as you go.

The final five…

GDPR Terminology

Right to be Forgotten

Also known as Data Erasure, it entitles the data subject to have the data controller erase his/her personal data, cease further dissemination of the data, and potentially have third parties cease processing of the data

Article 17, Recital 65, Recital 66

Right to Access

Also known as Subject Access Right, it entitles the data subject to have access to and information about the personal data that a controller has concerning them

Supervisory Authority

An independent public authority which is established by a Member State pursuant to Article 51

Article 4, Article 12, Article 13, Article 14, Article 15, Article 28, Article 30, Article 31, Article 33, Article 34, Article 35, Article 36, Article 37, Article 39, Article 40, Article 41, Article 42, Article 43, Article 45, Article 46, Article 47, Article 49, Article 51, Article 52, Article 53, Article 54, Article 55, Article 56, Article 57, Article 58, Article 59, Article 60, Article 61, Article 62, Article 64, Article 65, Article 66, Article 68, Article 74, Article 77, Article 78, Article 79, Article 80, Article 83, Article 91, Recital 36, Recital 80, Recital 81, Recital 82, Recital 84, Recital 85, Recital 86, Recital 87, Recital 91, Recital 94, Recital 95, Recital 96, Recital 108, Recital 109, Recital 113, Recital 117, Recital 119, Recital 120, Recital 121, Recital 122, Recital 124, Recital 125, Recital 126, Recital 127, Recital 128, Recital 129, Recital 130, Recital 131, Recital 133, Recital 134, Recital 135, Recital 136, Recital 137, Recital 138, Recital 139, Recital 141, Recital 142, Recital 143, Recital 144, Recital 148, Recital 150, Recital 151

Supervisory Authority Concerned

A supervisory authority which is concerned by the processing of personal data because: a) the controller or processor is established on the territory of the Member State of that supervisory authority; b) data subjects residing in the Member State of that supervisory authority are substantially affected or likely to be substantially affected by the processing; or c) a complaint has been lodged with that supervisory authority

Article 4, Article 52, Article 60, Article 64, Article 65, Article 66, Recital 36, Recital 124, Recital 135, Recital 136

Third Party

A natural or legal person, public authority, agency or body other than the data subject, controller, processor and persons who, under the direct authority of the controller or processor, are authorized to process personal data

Article 4, Article 6, Article 13, Article 14, Recital 47, Recital 69

GDPR Compliance Next Steps?

Now that you have a good understanding of GDPR Terminology you can move on to determine whether your organization will be held responsible for GDPR compliance.  If you’re already sure that you will be obligated under this new legislation and are searching for effective compliance training, we offer several options to fit your skill level.

Microsoft 365 GDPR Compliance

CyberTraining 365 is an online academy that offers nearly 1,000 hours of relevant and cutting-edge GDPR and cybersecurity training. Our training provides the most in-demand industry certification prep courses including EC-Council, CompTIA, (ISC)2 and Cisco; all taught by leading cybersecurity experts. All of our offerings are aligned with the national initiative for cybersecurity education (NICE) and ensure the most up-to-date information for this constantly shifting field. With engaging content in a scenario-based format, CyberTraining 365 uses bite-sized micro-learning methodology ensures learners are not overwhelmed with information. On Demand, LMS platform has white-label capabilities ideal for internal training purposes.

Leave a Reply

Your email address will not be published. Required fields are marked *